메뉴 건너뛰기




Volumn , Issue , 2014, Pages 30-41

How to use bitcoin to incentivize correct computations

Author keywords

Bitcoin; Bounties; Fair exchange; Secure computation; Verifiable computation

Indexed keywords

COMPLEX NETWORKS; CRYPTOGRAPHY;

EID: 84910657489     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660380     Document Type: Conference Paper
Times cited : (156)

References (35)
  • 1
    • 84910660414 scopus 로고    scopus 로고
    • Bitcoin wiki: CVEs. https://en.bitcoin.it/wiki/CVEs#CVE-2010-5141.
    • Bitcoin Wiki: CVEs
  • 5
    • 84892377298 scopus 로고    scopus 로고
    • Fair and efficient secure multiparty computation with reputation systems
    • Gilad Asharov, Yehuda Lindell, and Hila Zarosim. Fair and efficient secure multiparty computation with reputation systems. In Asiacrypt (2), pages 201-220, 2013.
    • (2013) Asiacrypt , vol.2 , pp. 201-220
    • Asharov, G.1    Lindell, Y.2    Zarosim, H.3
  • 6
    • 84871564300 scopus 로고    scopus 로고
    • Calling out cheaters: Covert security with public verifiability
    • Gilad Asharov and Claudio Orlandi. Calling out cheaters: Covert security with public verifiability. In Asiacrypt, pages 681-698, 2012.
    • (2012) Asiacrypt , pp. 681-698
    • Asharov, G.1    Orlandi, C.2
  • 7
    • 0000416796 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. In Eurocrypt, 1998.
    • (1998) Eurocrypt
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 8
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • Salil P. Vadhan, editor volume 4392 of LNCS, Springer, February 2007
    • Yonatan Aumann and Yehuda Lindell. Security against covert adversaries: Efficient protocols for realistic adversaries. In Salil P. Vadhan, editor, 4th Theory of Cryptography Conference-TCC 2007, volume 4392 of LNCS, pages 137-156. Springer, February 2007.
    • (2007) 4th Theory of Cryptography Conference-TCC , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 9
    • 84940423444 scopus 로고    scopus 로고
    • Bitter to better-how to make bitcoin a better currency
    • S. Barber, X. Boyen, E. Shi, and E. Uzun. Bitter to better-how to make bitcoin a better currency. In FC, 2012.
    • (2012) FC
    • Barber, S.1    Boyen, X.2    Shi, E.3    Uzun, E.4
  • 11
    • 84945178660 scopus 로고    scopus 로고
    • How to use bitcoin to design fair protocols
    • Iddo Bentov and Ranjit Kumaresan. How to use bitcoin to design fair protocols. In ePrint 2014/129, 2014.
    • (2014) EPrint 2014/ 129
    • Bentov, I.1    Kumaresan, R.2
  • 12
    • 84884472579 scopus 로고    scopus 로고
    • Highly-scalable searchable symmetric encryption with support for boolean queries
    • D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner. Highly-scalable searchable symmetric encryption with support for boolean queries. In Crypto (1), 2013.
    • (2013) Crypto , vol.1
    • Cash, D.1    Jarecki, S.2    Jutla, C.3    Krawczyk, H.4    Rosu, M.5    Steiner, M.6
  • 13
    • 84884473382 scopus 로고    scopus 로고
    • Practical multlinear maps over the integers
    • J.-S. Coron, T. Lepoint, and M. Tibouchi. Practical multlinear maps over the integers. In Crypto (1), 2013.
    • (2013) Crypto , vol.1
    • Coron, J.-S.1    Lepoint, T.2    Tibouchi, M.3
  • 15
    • 84916216325 scopus 로고    scopus 로고
    • On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
    • S. Garg, C. Gentry, S. Halevi, and D. Wichs. On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. In ePrint 2013/860.
    • EPrint 2013/ 860
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Wichs, D.4
  • 16
  • 17
    • 79960854270 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Advances in Cryptology-Crypto 2010, 2010.
    • (2010) Advances in Cryptology-Crypto 2010
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 18
    • 84889679875 scopus 로고    scopus 로고
    • Quadratic span programs and succinct nizks without pcps
    • R. Gennaro, C. Gentry, B. Parno, and M. Raykova. Quadratic span programs and succinct nizks without pcps. In Eurocrypt, 2013.
    • (2013) Eurocrypt
    • Gennaro, R.1    Gentry, C.2    Parno, B.3    Raykova, M.4
  • 21
    • 84937555419 scopus 로고    scopus 로고
    • Uncheatable distributed computations
    • David Naccache, editor volume 2020 of LNCS, Springer, April 2001
    • Philippe Golle and Ilya Mironov. Uncheatable distributed computations. In David Naccache, editor, Cryptographers' Track-RSA 2001, volume 2020 of LNCS, pages 425-440. Springer, April 2001.
    • (2001) Cryptographers' Track-RSA , pp. 425-440
    • Golle, P.1    Mironov, I.2
  • 22
    • 84910661844 scopus 로고    scopus 로고
    • Efficient two party and multi party computation against covert adversaries
    • V. Goyal, P. Mohassel, and A. Smith. Efficient two party and multi party computation against covert adversaries. In Advances in Cryptology-Eurocrypt 2008.
    • (2008) Advances in Cryptology-Eurocrypt
    • Goyal, V.1    Mohassel, P.2    Smith, A.3
  • 23
    • 84878348015 scopus 로고    scopus 로고
    • Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution
    • Y. Huang, J. Katz, and D. Evans. Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In IEEE Security and Privacy, pages 272-284, 2012.
    • (2012) IEEE Security and Privacy , pp. 272-284
    • Huang, Y.1    Katz, J.2    Evans, D.3
  • 25
  • 27
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of Yao's protocol for two-party computation
    • Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. Journal of Cryptology., 22(2):161-188, 2009.
    • (2009) Journal of Cryptology , vol.22 , Issue.2 , pp. 161-188
    • Lindell, Y.1    Pinkas, B.2
  • 29
    • 84954474682 scopus 로고    scopus 로고
    • Efficiency tradeoffs for malicious two-party computation
    • P. Mohassel and M. Franklin. Efficiency tradeoffs for malicious two-party computation. In PKC 2006.
    • (2006) PKC
    • Mohassel, P.1    Franklin, M.2
  • 31
  • 35
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract
    • Andrew Yao. How to generate and exchange secrets (extended abstract). In FOCS, pages 162-167, 1986.
    • (1986) FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.